Module 2 Part C Application Controls
Module 2 Part C Application Controls
Storage
Data base, files, discs, tapes
Application controls: Background…………..continued
Distribution of output
Controls regarding
•Ensuring the correct data, files and
programs are used
•Calculating control total
•Programming of the software
•Electronic logs to be maintained, reviews to
be performed
Controls regarding
•Correctness of generation of output
•Proper distribution of output
•The receipt of output
•Electronic logs to be maintained and
reviews
Manual vs computer controls
Example
Authentication tables granting
access to the system,
validation control
• (such as sign tests and field
length tests) in which the
computer checks all data
captured against pre-
programmed criteria
Class Question 3: Source -Graded Questions on Auditing 2017
The following controls have been implemented at GoodReads (Pty) Ltd, a large book wholesaling company which has a fully
computerised accounting system.
1. When a delivery is made from a supplier to GoodReads (Pty) Ltd, the receiving clerk enters the order number for the goods into the
system. If the order number is not valid, the receiving clerk will not accept the delivery.
2. A new employee cannot be successfully added to the employee masterfile without a valid income tax reference number being
entered.
3. GoodReads (Pty) Ltd recently appointed a committee to monitor and advise on the specific risks faced by the IT department.
4. When an application programme change request is made by a user department, it must be approved by the IT steering committee
and the head of the user department before it is effected.
5. All creditors are paid by electronic funds transfer. To effect a transfer, two senior employees must independently enter their unique
passwords.
6. Entry to GoodReads (Pty) Ltd’s data centre (which houses important hardware) is restricted. Swipe cards and PIN numbers are used to
limit access.
8. A purchase order must be supported by a stores requisition signed by the warehouse controller.
9. If a debtor has not paid its account within two working days of exceeding its credit terms, for example 60 days, Barry Potter the credit
controller, contacts the debtor to request payment.
10. The chief information officer conducts regular meetings with IT personnel on an individual basis, to enforce the importance of a
strong ethical culture and discuss ethical situations which may have arisen.
YOU ARE REQUIRED TO indicate whether each of the controls listed under 1 to 10 above, is a general control or an application control.
For those controls which you identify as general controls, indicate the category of general control to which each relates.
Class Discussion Question (Input
Controls)
• Refer to Question in the course notes.
Overview of application controls
Chapters 6 to 10: practical application of detailed application controls
Revenue and receipts cycle
Purchases and payments cycle
Inventory and production cycle
Human resources cycle
Never in isolation to general controls!
Key areas in application controls:
Input Controls.
• Objective: data entered
and Masterfile changes are
valid, accurate and
complete
• E.g. correct information, no
duplications, not fictitious, all
input entered.
• Must also address rejected
input
• Consequences if input
controls fail. Refer to next
slide
Input
Controls…..continued
Class Example
Consider asking a friend to be
your answer, make calls and • Failure to address input process
send message on your phone. effectively will result in:
This is what might happen:
• Unauthorised transactions
• The person may make
unauthorised calls to her being entered
friends or family using your
airtime
• Data already in the system
• Person may delete your being added to or deleted
pictures, apps or important
messages
• Errors occurring during the
• Person may download app
that are against your taste creation of data
• Person may send improper
messages to your contacts • Data being lost
e.g. forward them group
messages
• Class to discuss measures to
avoid the situation
mentioned above
Input controls…….. continued
• Input controls are necessary over:
. • Data capturer • Computer
‘screen’
This is done by
This is done to means of controls
programmed into
identify and
the software
correct any (known as logical
errors timeously programmed
controls)
• Management • Computer
review of the ‘screen …
data continued’
Input controls…… (continued)
Alphabetic/alphanumeri
Limit test or range
Validity test c/numeric character
test check
Only allow as
Confirms data alphabetic Test the data
entered on system characters or only against a threshold
against a Masterfile numeric characters or predetermined
to ensure validity or an error message benchmark
will pop up
Controls over
User related Controls on Error Correction
distribution of
Controls receiving output process
output
• Access control • Should be • Reconciliation • Refer to
over printer, written policy on of input to prescribed
screen how the output output textbook: Audit
• Controls over and confidential • Performing Fundamentals
actual output information is output count
e.g. marked treated • Checking if
confidential and • Must be a blank pages
emails manual or contain words
encrypted electronic such as ‘empty
register during page’
distribution of
output
Masterfile Change Controls
Debtors
Masterfile
Payroll Creditors
Masterfile Masterfile Masterfile
Inventory
Masterfile
Masterfile change control……..continued
• When standing data • Consequences if master file
changed, added, deleted change controls fail.